Reducing the Quantum Communication Cost of Quantum Secret Sharing
نویسندگان
چکیده
منابع مشابه
Communication Efficient Quantum Secret Sharing
Building upon the recent work in communication efficient classical secret sharing schemes of Bitar and El Rouayheb, we study communication efficient quantum secret sharing schemes. In the standard model of quantum secret sharing, typically one is interested in minimal authorized sets for the reconstruction of the secret. In such a setting, reconstruction requires the communication of all the sh...
متن کاملCircular quantum secret sharing
Fu-Guo Deng, Hong-Yu Zhou, and Gui Lu Long † 1 The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875, China 2 Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875, China 3 Beijing Radiation Center, Beijing 100875, China 4 Key Laboratory ...
متن کاملGeneralized Quantum Secret Sharing
We explore a generalization of quantum secret sharing (QSS) in which classical shares play a complementary role to quantum shares, exploring further consequences of an idea first studied by Nascimento, Mueller-Quade and Imai (Phys. Rev. A64 042311 (2001)). We examine three ways, termed inflation, compression and twin-thresholding, by which the proportion of classical shares can be augmented. Th...
متن کاملMultiparty Quantum Secret Sharing
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a (n, n)-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), in which only all quantum information recei...
متن کاملAssisted Quantum Secret Sharing
A restriction on quantum secret sharing (QSS) that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2012
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2012.2205895